Reference no: EM131220539
Application: Cybercrime-Related Laws and Digital Evidence
Imagine you are watching a movie that has a dramatic court scene where the prosecutor picks up a menacing weapon used in the commission of the crime. As he or she thrusts it up high for all to see, a collective gasp echoes through the courtroom. The jury's eyes widen as their minds struggle to process the weapon visually.
Now consider the same movie scene again. Except this time, the prosecutor picks up a laptop and thrusts it into the air. The same dramatic reaction, however, is unlikely. Although digital evidence that is stored in devices might seem intangible, this type of evidence has been used in previous legal cases for trying cybercrime.
Cybercrime is just as real and subject to the same burdens of proof and judicial process. Yet, the admissibility of digital evidence for establishing proof of a cybercrime can be challenging. Understanding the linkage between digital evidence and the execution of a cybercrime is important for establishing a legal case.
To prepare for this Assignment, pick one of the following areas of cybercrime and select a federal or state law that addresses it:
- Computer Intrusions
- Cyberterrorism
- Cyberharassment and Cyberstalking
- Economic Espionage
- Financial Crimes and Fraud
For this Assignment, write a 3- to 5-page paper in APA format that:
- Summarizes the key elements of the law.
- Explains the types of digital evidence that would need to be collected to prosecute a case under this law. Be sure that you include possible sources of evidence, such as computing devices, wireless devices, and Internet service providers (ISPs).
- Proposes a new or emerging technology within the area of cybercrime selected that might not be covered under this law.
Required ResourcesReadings
- Easttom, C., & Taylor, J. (2011). Computer crime, investigation, and the law. Boston, MA: Course Technology.
- Chapter 6, "Organized Crime and Cyber Terrorism" (pp. 210-223)
These pages discuss cyber terrorism, information warfare, and cyber espionage.
- FindLaw. (1999). United States v. Upham. Retrieved from https://caselaw.lp.findlaw.com/scripts/getcase.pl?navby=search&case=/data2/circs/1st/981121.html This site contains the text for the appeal for United States v. Upham.
Analyze and interpret what the author is saying and doing
: Clear exposition of text - Describe (i.e. give a clear exposition or summary of) what the author is saying and doing; An effective way to do this is by pre-reading, reading, re-reading, making notes and summarizing them.
|
Issue of trust an integral part of a security policy
: 1). Why is the issue of trust an integral part of a security policy 2). Why is an e-mail use policy important?
|
Investment amount
: Amy Monroe wants to create a fund today that will enable her to withdraw $25,780 per year for 8 years, with the first withdrawal to take place 4 years from today. If the fund earns 10% interest, how much must Amy invest today?
|
Attributes represent in an er model
: Describe what attributes represent in an ER model and provide examples of simple, composite, single-value, multi-value, and derived attributes
|
Cybercrime-related laws and digital evidence
: Imagine you are watching a movie that has a dramatic court scene where the prosecutor picks up a menacing weapon used in the commission of the crime. As he or she thrusts it up high for all to see, a collective gasp echoes through the courtroom. T..
|
Conduct a service firm audit for a local business
: MKT203 - Services Marketing - This assessment requires students to adopt the position of marketing consultants and conduct a service firm audit for a local business. Students are to work within groups of no more than three students.
|
What is the sales level in dollars required to equal year
: Eagle Company makes the MusicFinder, a sophisticated satellite radio. Eagle has experienced a steady growth in sales for the past five years. However, Ms. Luray, Eagle's CEO, believes that to maintain the company's present growth will require an aggr..
|
Describe the planning process for public health intervention
: Describe the planning process for public health interventions. Explain the importance of defining a health problem to program management. Identify possible outcome, impact, and process objectives.
|
Manufactures golf clubs in three models
: Lisah, Inc., manufactures golf clubs in three models. For the year, the Big Bart line has a net loss of $3,600 from sales $201,000, variable costs $175,000, and fixed costs $29,600. If the Big Bart line is eliminated, $19,100 of fixed costs will rema..
|